Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/9913
Title: Security Application In Bluetooth Technology
Authors: Ismaila, Idris
Morufu, O.
Keywords: Bluetooth, Security, Network, Protocol, Application
Issue Date: Aug-2011
Publisher: Journal of Science, Technology, Mathematics and Education (JOSTMED)
Series/Report no.: ;3
Abstract: Before implementing some new technologies, a simulation program is usually designed to first demonstrate how the technology works. If it works perfectly, then the real implementation takes place, but if it fails, correction is made before the implementation. In this paper, we shall examine a program that demonstrates security application in Bluetooth technology. We shall also discuss how Bluetooth technology provides security measures at both the application layer and the data link layer. Finally we look at the two kinds of inherent features that make attacks more difficult.
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/9913
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
ismaila and olalere 2011_security application.pdfSECURITY APPLICATION IN BLUETOOTH TECHNOLOGY110.45 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.